E-Discovery Trends: 2014 Year in Review | Practical Law

E-Discovery Trends: 2014 Year in Review | Practical Law

This Article looks back on recent technology trends and other key developments affecting e-discovery and information governance in 2014, and highlights those issues that are likely to gain prominence in the year ahead.

E-Discovery Trends: 2014 Year in Review

Practical Law Article 3-588-7525 (Approx. 14 pages)

E-Discovery Trends: 2014 Year in Review

by Meagan Crowley-Hsu, Practical Law
Published on 15 Nov 2014USA (National/Federal)
This Article looks back on recent technology trends and other key developments affecting e-discovery and information governance in 2014, and highlights those issues that are likely to gain prominence in the year ahead.
The past year has seen e-discovery remain a top concern for litigators. The ongoing upsurge in electronic communications and an increasing array of electronic communication methods have altered the way clients do business and directly affected discovery in litigation. In 2014, companies and law firms alike continued to bring more of the e-discovery process in-house, seeking increased savings and profits. Companies also continued their efforts to centralize control over their e-discovery needs, rather than reengineering an e-discovery process workflow with different law firms handling individual litigations.
Perhaps unsurprisingly, the most commonly cited e-discovery trends over the last year concern the challenges and opportunities presented by developing technologies and the changing ways they are being used, both in terms of how data is created and stored and the increasing reliance on analytical tools employed to review it. New forms of communication and varying sources of electronically stored information (ESI) present a myriad of obstacles in e-discovery practice.
“The rising volume of data we are experiencing coupled with the rapid evolution of technology are the real drivers of change in the e-discovery space,” says Jason R. Baron, Of Counsel at Drinker Biddle & Reath LLP and co-founder of the Information Governance Initiative, a consortium and think tank comprised of corporate data and IT experts, attorneys and solutions providers. “We are in an exponential world, with the amount of data doubling every two years,” he adds. “In five or ten years, we will be looking at hundreds of times the volume of ESI that is now routinely collected in large cases. We are living in this world of big data and we are learning how to deal with it.”
This Article explores how counsel and the larger legal community have sought ways to stay grounded on the shifting e-discovery landscape by:
  • Experimenting with more technology-assisted review (TAR) tools in the litigation process, and honing best practices for handling increasingly important data sources, such as mobile devices, social media, and audio and voice files (see Evolving Technologies).
  • Contributing to the nearly-completed rulemaking process for the forthcoming amendments to the Federal Rules of Civil Procedure (FRCP), which, after being reviewed by the US Supreme Court, are expected to be voted on by Congress in April 2015 and effective in December 2015 (see Proposed Amendments to the FRCP).
  • Becoming more involved in information governance activities, including identifying innovative applications of TAR to better manage data lifecycles and calling for a new C-level executive to champion information governance initiatives (see The Ascent of Information Governance).
  • Taking steps to increase attorneys’ technological competence and know-how, through ethical rules and opinions, and cutting-edge law school curriculum development (see Increased Technological Competence).

Evolving Technologies

Law firms and their clients continued to grapple with new technology trends in 2014. Technological advancements impacted e-discovery in several key ways, including:
  • Driving new efficiencies in ESI review and production through greater use of TAR tools, including predictive coding (see More Use of TAR Tools).
  • Creating added challenges posed by new and evolving data sources (see Expanding Data Sources).

More Use of TAR Tools

Though not new to the litigation market, the use of TAR tools gained considerable traction in the past year. “As parties look for more efficient ways to reduce the burden of e-discovery,” says Baron, “TAR will be an accelerating trend.” With TAR becoming more widespread, 2014 has seen:
  • More accepting attitudes toward TAR and heightened aptitude for using it, as well as a series of court decisions encouraging parties to consider employing TAR tools (see Growing Comfort with TAR).
  • The emergence of two common disputes in the federal courts concerning the use of TAR tools (see Common TAR Disputes).
“We started a few years ago with attorneys wondering, and a handful of cases debating, if we could use these tools at all. We have passed that threshold,” explains Gilbert S. Keteltas, a partner at BakerHostetler and co-leader of the firm’s E-Discovery Advocacy and Management Team. “Now the debate is about how and when to use TAR defensibly, and whether a court will bless the outcome.”
For information on the basic technology behind TAR, common TAR tools and how best to use TAR in litigation, see Practice Note, Long Live Predictive Coding and Predictive Coding: A Primer.

Growing Comfort with TAR

TAR tools are useful for three primary purposes, according to Wayne C. Matus, Managing Director and Global Head of eDiscovery at UBS AG:
  • Streamlining document review project management by segregating ESI, based on the probability of responsiveness, enabling counsel to devote the right resources to each type of document.
  • Verifying the accuracy of a review process through sampling to ensure the quality of the coding and production decisions made by human reviewers.
  • Limiting the document review workload by agreeing with opposing counsel to review only a subset of potentially responsive ESI.
TAR tools were traditionally used by large companies struggling with vast volumes of ESI, but plaintiffs and requesting parties have increasingly found value in these tools. “Those of us on the requesting side are not only looking to understand how TAR tools are being used by the other side, we are using the tools ourselves to prepare our cases,” says Ariana J. Tadler, a partner at Milberg LLP and chair of the firm’s E-Discovery Practice Group.
Although best practices for TAR protocols and negotiations are surfacing, no US district court has yet had occasion to wade into the details of a completed TAR process and bless its outcome, which seems more likely to happen in 2015. However, several courts have issued decisions in the past year that should provide comfort to counsel that the use of TAR tools will be approved, and often encouraged, by district court judges (see, for example, F.D.I.C. v. Bowden, No. 13-0245, , at *13 (S.D. Ga. June 6, 2014); Chen-Oster v. Goldman, Sachs & Co., No. 10-6950, , at *1 (S.D.N.Y. Feb. 18, 2014)).
Yet some attorneys remain reluctant to incorporate TAR into their litigation processes. “There is fear that the current process to ensure the use of TAR will not be second-guessed creates barriers to entry for the practitioner. There are costs to agree on process and resolve disagreements with the court. And there are fears about sharing information with an opponent that, historically, has not been shared in discovery,” says Keteltas. “Unfortunately, some of the same cases that seem to open the door to TAR suggest to those unfamiliar with the TAR process that these tools may cause, rather than reduce, complexity and burden.”
Keteltas explains that this is a misperception. “TAR tools are being used in many cases by agreement without the need for judicial intervention. If you are willing to learn about and experiment with these tools, and you are not looking for a ‘take it or leave it’ approach to discovery,” he says, “those barriers to entry are not real.”

Common TAR Disputes

Recent decisions on TAR disputes have involved two main themes:
  • The extent of required transparency concerning the specific responsive and non-responsive ESI that a party uses to train a TAR tool (the seed set).
  • The proper timing to disclose the use of a TAR tool.
Most experts agree that transparency, in this context, typically means some level of disclosure concerning the tools to be used and the process to be followed. “Although we are at a point where more attorneys are using TAR tools, they are still trying to decide what metrics to apply and what to talk about with opposing counsel,” observes Keteltas. “Those are open issues.”
In particular, there is not yet consensus on whether parties must disclose the seed set used to train a TAR algorithm (see, for example, In re Biomet M2a Magnum Hip Implant Prods. Liab. Litig., No. 12-2391, , at *1 (N.D. Ind. Aug. 21, 2013) (party not required to share non-responsive ESI used in seed set); see also Progressive Cas. Ins. Co. v. Delaney, No. 11-678, , at *9-10 (D. Nev. July 18, 2014) (where party refused to share seed set, it was required to forgo predictive coding and disclose all ESI hitting on the negotiated search terms)).
The right timing for parties to use and disclose TAR has also prompted several disputes, specifically whether a party may decide to employ TAR tools after:
Both Tadler and Keteltas point out that many TAR disputes arise where parties have an insufficient grasp on the technology to develop an effective protocol. TAR tools are evolving and the best tool available today may be obsolete in short order. Parties can better cope with these changes by focusing on a defensible process for information search and retrieval that can adapt to changes in technology. Therefore, counsel must stay abreast, through research, education and expert advice, of the most effective tools that are appropriately calibrated to the data demands of the specific case (see Increased Technological Competence).
By contrast, where counsel on both sides have experience with how the TAR tools work and come to negotiations with a cooperative attitude, e-discovery discussions can be very productive. “If there is a level of trust and transparency that can be engaged in the discussion, things seem to work quite swimmingly,” says Tadler. “But if you are not informed enough to participate in the discussion, you have an obligation to bring someone to the table who is.”

Expanding Data Sources

The new ways in which employees use evolving technologies posed significant challenges to e-discovery practice in 2014. Counsel continues to wrestle with how to properly identify, preserve, collect and review data stored on mobile devices, social media, and audio and voice files. Although companies in some regulated industries, like financial services, have long been subject to rules governing the retention of data held by these sources, specific guidance otherwise remains scattered. “We do not yet have well-known rules of the road for these devices or technologies,” says Baron. “We are all struggling to define what constitutes best practices in this area.”

Mobile Devices

In the past year, the escalating use of mobile devices by employees and corporate “bring your own device” (BYOD) policies reached new heights. However, in addition to posing information security and regulatory risks, BYOD policies come into direct tension with the privacy interests of employees and challenge traditional notions of corporate control over employee-created data. Still, these devices are likely to constitute mainstream (and voluminous) sources of ESI in the near future.
“Employees who are empowered to use these devices and applications will, in fact, use them,” remarks Baron. “As a baseline, employers need to practice more transparency in terms of notifying their employees that what they are doing with their smartphones may be subject to a legal process.”
While early BYOD policies tended to only generally address corporate access and control of the devices for purposes of e-discovery, more recent BYOD policies now weigh more heavily in favor of an employer’s ability to monitor, control and review employee-created data in connection with e-discovery or compliance obligations.
However, these newer policies may be cause for concern, particularly following recent rulings from the National Labor Relations Board suggesting that the policies may reflect employer overreach and improper control of employee internet usage, and the Supreme Court’s recognition in Riley v. California of the compelling privacy expectations for mobile devices (see 134 S. Ct. 999 (2014); see also Bakhit v. Safety Marking, Inc., No. 13-1049, , at *2-3 (D. Conn. June 26, 2014) (declining to order inspection of cell phones paid for or provided by an employer as overly broad and too intrusive, particularly in light of the privacy concerns intrinsic to cell phones as recognized by the Riley decision)).
Moreover, the sheer variety of mobile devices can make proper preservation and collection daunting tasks, even where an employer has employee consent. For example, companies must rely heavily on employee compliance with these policies to manage the risk of lost or deleted data, absent a centralized repository for business-related data. Depending on the device at issue, certain deleted data, such as text messages, and video and audio files, or the metadata associated with these items, may not be recoverable.
Courts are increasingly reaching consensus that the deletion of relevant mobile-stored data like text messages can subject a party to sanctions (see, for example, Small v. Univ. Med. Ctr. of S. Nev., No. 13-0298, , at *28 (D. Nev. Aug. 18, 2014)). This makes the preservation concerns associated with mobile devices particularly thorny for employers, who may face severe repercussions, including monetary penalties and adverse jury instructions, for data deleted from an employee’s personal device.

Social Media

The proliferation of social media use, with estimates of 73% of all adults having a social media account and over 50% of Fortune Global 100 companies with active Twitter or Facebook accounts, means that social media is poised to have a growing influence on litigation. Some observers have suggested that social media evidence may eventually overtake e-mail as the predominant form of ESI in many cases.
Although social media ESI is subject to the same e-discovery principles as other ESI, courts have struggled in the past year to identify appropriate approaches to handle, for example:
Having flexible sources of guidance will be critical for litigants and courts to address this new set of issues, according to US District Court Judge Lee H. Rosenthal for the Southern District of Texas. “As new forms of social media and other data sources emerge, e-discovery protocols and principles, as well as template orders to guide judges will be enormously helpful,” she says. “There are professional organizations, bar associations and courts energetically working on these topics and that needs to continue.”
For more on the key issues surrounding social media in various stages of litigation, see Practice Note, Social Media: What Every Litigator Needs to Know.

Audio and Voice Files

The burgeoning volume of audio files, such as voicemails, recorded telephone lines and “squawk boxes” used by broker-dealers, has brought about uniquely complex e-discovery challenges. Particularly within the financial services industry, both the FRCP (which identify audio files as ESI) and the Dodd-Frank Act require companies to retain audio files in certain circumstances. These requirements, when combined with lower data storage costs and more advanced voice recording technology, have resulted in many companies storing increasingly vast volumes of audio files.
Companies are regularly asked to produce responsive audio files in regulatory investigations on a short timetable but, unlike text-based files, audio files do not lend themselves to traditional search technologies, making identification of relevant files more difficult, time-consuming and costly. Unlike e-mails, for example, audio files tend to possess only minimal metadata and may not be suitable for easy search or automated analysis.
“I think we have seen e-mail reach the end of its evolutionary cycle, and we are beginning to see technology get to the point where voice files will become a more significant and problematic source of data requiring a lot of time and analytical ability to be properly utilized,” explains Matus. “We are facing a new frontier.”
Most current voice search technology focuses on either transcription of audio files or phonetic indexing to increase visibility into these files. As Matus notes, however, the technology is in its infancy. “Voice search technology in 2014 is where textual search technology was in 2004.”

Proposed Amendments to the FRCP

Following a robust rulemaking process that featured substantial hearing testimony from e-discovery experts and thousands of written comments, new amendments to the FRCP are drawing near. After the unanimous approval by the US Judicial Conference in October 2014, the Supreme Court will next vote to approve or reject the amendments. If approved, Congress will vote on the amendments in April 2015 and, assuming it does not vote to modify or reject the rules package, the amended rules will become effective in December 2015.
The proposed amendments to the FRCP will significantly impact e-discovery practice. Although the amended rules will not take effect until the end of 2015, e-discovery practitioners expect both litigants and courts to start addressing them over the coming year. A handful of courts have already referenced the amended rules in recent opinions (see, for example, Pettit v. Smith, No. 11-2139, , at *13 n.6 (D. Ariz. Sept. 9, 2014); Hawley v. Mphasis Corp., No. 12-592, , at *8 n.4 (S.D.N.Y. July 22, 2014)). Tadler believes this trend will continue. “We will likely see some judges articulating, albeit in dicta, how their rulings might be derived differently if the proposed rules were in effect,” she says. “They will start preparing the legal community for what is coming next.”
In general, the proposed rules seek to modify and improve e-discovery practice by:
According to Judge Rosenthal, the proposed rules are intended to help attorneys and judges adapt to the changing environment. “You cannot write the civil rules based on today’s technology because they will be obsolete before they become effective,” she explains. “Therefore, the rules have to be general enough to accommodate changes while specific enough to be helpful. Striking that balance is the great challenge of rulemaking in this area.”

Renewing Focus on Proportionality

Proportionality in discovery is not new and has been the subject of litigation and negotiation since 1983, when the concept first appeared in the FRCP. However, the financial stakes and complex logistical issues that come with increased volumes of ESI have made proportionality critically important in civil litigation. Indeed, more than half of the defense attorneys surveyed as part of the rulemaking process indicated that they had settled a case due to the cost of litigation, and high discovery costs in particular, and more than half of all attorneys surveyed believed that judges did not enforce the existing proportionality limitations on their own (see Summary of the Report of the Judicial Comm. on Rules of Practice & Procedure, Rules Appendix B-6 (Sept. 2014)).
The proposed rules attempt to limit the broad scope of discovery, requiring parties and the court to consider:
  • The importance of the issues at stake in the action.
  • The amount in controversy.
  • The parties’ respective resources.
  • The importance of the discovery in resolving the issues in the case. Whether the burden and expense of the proposed discovery outweighs its likely benefit.
  • The parties’ relative access to relevant information.
(Proposed FRCP 26(b)(1).)
Many observers, while mindful of the purpose behind the renewed emphasis on proportionality, predict an increase in motion practice based on bare-bones assertions of disproportionality. Tadler emphasizes that vague objections to requests to produce are not acceptable under proposed Rule 34, which requires that the grounds for objecting be stated with specificity. She questions, however, if litigators will adequately familiarize themselves with the new rules. “One of the greatest and most troubling dilemmas,” notes Tadler, “is that even when the rules are on the books, attorneys do not necessarily read them.”
Some district court judges have also expressed concern about the application of the proportionality principles. “At one level, proportionality is not the stuff of high jurisprudence. It asks for common sense and practicality,” Judge Rosenthal says. “But judges are properly worrying about whether, given the novelty of these issues, we will be able to recognize and implement reasonable limits on the discovery sought that are fair and workable for both sides, and serve the needs of the case.”
Still, Judge Rosenthal suggests that judges will have the same kinds of choices as in the past for tailoring discovery, such as limiting the forms of production, the time period of the discovery, or the data sources for collection, or requiring the requesting party to bear some of the costs. “All of these choices have been with us for a long time with conventional paper discovery,” she says. “Now they are more complicated and varied, but ultimately, these decisions involve the same kinds of analysis we have done for years.”

Clarifying Sanctions for Failure to Preserve

Even in the face of credible evidence that companies continue to over-preserve vast stores of data for fear that some ESI might be lost, and that their actions may in hindsight be deemed negligent or subject them to drastic sanctions, the proposed rules identify no guidelines concerning the scope or duration of ESI preservation. Early attempts to incorporate detailed preservation standards into the FRCP were later abandoned as unworkable.
Instead, proposed Rule 37(e) focuses on clarifying the consequences for loss of ESI by:
  • Requiring a party seeking any remedy for lost ESI to first demonstrate that the ESI:
  • was lost because a party failed to take reasonable steps to preserve it; and
  • cannot be replaced through additional discovery.
(Proposed FRCP 37(e).)
  • Allowing a court to craft relief that is “no greater than necessary to cure” any prejudice suffered, where there was no intent to deprive a party of the lost ESI (Proposed FRCP 37(e)(1)).
  • Permitting drastic sanctions like adverse inferences only where there was an intent to deprive, resolving a circuit split on when these sanctions are appropriate (Proposed FRCP 37(e)(2)).
“It is the hope,” says Judge Rosenthal, that the reasonable steps language and the curative framework in proposed Rule 37(e) “will have a back-looking effect, making it easier for large data producers to decide not to keep certain kinds of ESI without fear that if they fail to keep everything, they will be sanctioned for not having something.”
However, many law firm and in-house attorneys are skeptical that the proposed rule will ameliorate the problem of over-preservation. Given the absence of any guidelines, including whether proportionality can be applied at the preservation stage, “there is nothing we can do with regard to preservation but hope that once judges read, study and understand the new rules, they will take the admonition of the Advisory Committee to heart and apply the proportionality concept to preservation,” says Matus.
Baron agrees. “Many attorneys believe that Rule 37 will have an impact in reducing the volume of ESI that will be necessary to preserve in a particular litigation. If that is the case, it is a good thing,” he says. “But the jury is still out on the effect that the rules will have. Prudent counsel will always err on the side of collecting more, even with the express language about proportionality in Rule 26.”
Notably, proposed Rule 37(e) is limited to ESI, and all prior sanctions and spoliation decisional authority remain applicable to tangible items. Although this amendment generated minimal public comment, it may have big implications in the future. “I think you will see situations where it is unclear whether the evidence is ESI or not,” suggests Tadler. “For example, if a case involves an automobile and the electrical systems of the automobile are relevant to the litigation, to what extent does the information being sought fall within the rule for ESI or the rule for a tangible object (the car itself)? This area of law will create some interesting quandaries.”

Encouraging Cooperation and Active Case Management

As many practitioners have advocated, efficient and cost-effective e-discovery depends on both a cooperative relationship with opposing counsel, and early and active management of e-discovery issues.
Several of the proposed rules look to serve these goals. The most prominent are:
  • Rule 1, which now directs attorneys to construe the FRCP in a way that “parties share the responsibility” with the court to achieve the “just, speedy, and inexpensive determination of every action” (Proposed FRCP 1, advisory comm. note).
  • Rule 16, which, among other things, encourages courts to:
    • hold conferences under the rule either in-person or by telephone (Proposed FRCP 16(b)(1)(B), advisory comm. note);
    • enter scheduling orders earlier in a case (Proposed FRCP 16(b)(2)); and
    • consider including certain e-discovery issues in the scheduling order, such as information on preservation of ESI, the use of pre-motion conferences to reduce discovery motion practice and the use of FRE 502(d) Orders (Proposed FRCP 16(b)(3)(B)). (For a sample FRE 502(d) order, with explanatory notes and drafting tips, see Standard Document, FRE 502(d) Order.)
“Even more than with paper discovery, ESI discovery requires a collaboration between judges and the attorneys,” says Judge Rosenthal. “Judges cannot be removed and distant from this process in the way we could be with most paper discovery because there are so many more decisions to make and points during a case where judicial involvement is needed. The rule changes are designed to facilitate judges being involved earlier and more frequently.”
For more on the meaning of cooperation in discovery, whether cooperation is truly required, what cooperation entails and how to facilitate cooperation with opposing counsel, see Article, Learning to Cooperate.

The Ascent of Information Governance

While companies have long struggled to deal with the massive volumes of data residing on their systems or in the cloud, law firm attorneys are also now looking for ways to help their clients manage data before e-discovery becomes necessary. In the last couple of years, information governance has emerged as an interdisciplinary practice that brings together stakeholders from records management, IT, legal, compliance, data privacy and cybersecurity groups to develop a holistic approach to managing increasingly vast stores of ESI in a way that:
  • Fulfills all relevant legal and compliance requirements.
  • Anticipates and mitigates information and security risks.
  • Optimizes the value of information.
Information governance has obvious implications for e-discovery practice. “You cannot fix the problems that exist from data that has already been created,” says Tadler, “but you can fix the amount of data, through preventive medicine, if you have good information governance practices in place.” By proactively managing data during its lifecycle, there is potential for a decreased volume of data when the time comes to collect and review potentially relevant information for an anticipated litigation or investigation. Baron adds that “if you have some foundational policies and practices in place, you have a leg up when a true crisis hits.”
Two recent trends in the information governance arena include:
  • The use of advanced analytical technologies, developed originally for e-discovery practice, to handle data more efficiently and cost-effectively (see Novel Applications of TAR).
  • A growing consensus among professionals for a single champion at the executive level to advocate for information governance initiatives (see Chief Information Governance Officers).

Novel Applications of TAR

Many companies and their counsel see great potential in incorporating TAR or other analytical review tools into information governance workflows. The market for these tools has grown considerably in the past year, with no signs of slowing (see Information Governance Initiative, 2014 Annual Report, at 22, available at iginitiative.com). Specifically, analytical tools may be employed to:
  • Detect patterns in data to identify legal and compliance risks.
  • Review and categorize information on an automated basis.
According to some proponents, TAR tools can be trained to create early warning systems, alerting companies to, for example, potential violations of the Foreign Corrupt Practices Act, or harassment or security policies. By analyzing patterns in unstructured data, TAR programs can detect risks and alert counsel to facilitate earlier corrective action.
“If you have criteria for what matters and what does not, and you can train on that criteria,” says Keteltas, “you can certainly apply certain data analytics tools to understand that data.” Doing so enables a company to avoid the costs associated with human review to determine what information should be retained. “TAR tools do not fit every situation, however. These novel applications may be better addressed through a range of other sophisticated data analytics tools rather than the type of machine learning we use in litigation,” Keteltas cautions.
Advocates commonly claim that TAR tools are well-suited either to:
  • Classify text-based unstructured data, such as e-mail files, shared drives or document repositories, on an ongoing basis to better manage the data during its lifecycle. These auto-categorization tools can be particularly useful, for example, to classify and segregate personally identifiable information for data privacy and security purposes.
  • Defensibly dispose of orphan or legacy data, the content of which is generally unknown, that is no longer in use, often resides on obsolete storage and is not subject to any legal or regulatory holds (commonly known as data remediation), or otherwise automate records retention policies.
However, counsel should remain cautious of the limits and claimed accuracy of TAR tools, particularly when it comes to data deletion of any kind. Matus warns that “given there is not widespread judicial recognition of these tools to replace human review in the first place, adding a preservation obligation to the mix makes one very hesitant to use the tools for that purpose.” Further, any effective machine learning program requires a base of properly coded and managed content to learn from, meaning that the output of a TAR program will be only as good as its input.

Chief Information Governance Officers

Getting an information governance program off the ground requires buy-in from both management and employees, along with a delicate balancing of the priorities of different business units. Breaking down silos and facilitating cross-departmental collaboration are among the chief challenges in managing an effective program.
Although interdisciplinary information governance committees are one recommended way to advance these efforts, “what we have in the last year is an emergence of calls for either a Chief Digital Officer or a Chief Information Governance Officer,” explains Baron. “It is necessary, but not sufficient, to bring together high-level people in the C-suite. What we need, in my view, is a single champion.”
A Chief Information Governance Officer would not replace, for example, a Chief Information Security Officer or Chief Privacy Officer, but instead would serve in a coordinating capacity between different departments and technologies. In addition to being familiar with e-discovery and records management, according to Baron, “ideally, this person would be comfortable with predictive coding, auto-categorization, analytical methods for internal risk and threat assessment, data mining methods and business intelligence.”
Some companies have already established these roles, though their titles tend to vary. Most observers expect more companies to follow suit as the specific responsibilities of the position are fleshed out over time.

Increased Technological Competence

Litigators with varying degrees of e-discovery and technological expertise are increasingly aware of the need to educate themselves on technological issues affecting their practice. This heightened awareness is reflected by:
  • Ethical rules and opinions underscoring the importance, and minimum expectations, of technological proficiency (see New Ethical Guidance).
  • Changes to law school curriculum to include coursework on e-discovery and data management (see Changing Law School Curriculum).

New Ethical Guidance

“We ignore at our peril the world that we live in where almost every case, even small ones or those involving disciplines not typically associated with high-level analytics issues, involves electronic or digital data,” says Baron. Competent representation now demands a level of technological proficiency, as demonstrated by language incorporated into rules adopted by the American Bar Association (ABA) and several state bars requiring attorneys to stay abreast of the benefits and risks associated with relevant technologies (see ABA Model Rules of Prof’l Conduct, R. 1.1 cmt. 8; Del. Lawyers’ Rules of Prof’l Conduct, R. 1.1 cmt. 6; Kan. Rules of Prof’l Conduct R. 1.1 cmt. 8; Pa. Rules of Prof’l Conduct R. 1.1 cmt. 8).
Earlier this year, the California State Bar Standing Committee on Professional Responsibility and Conduct went further in a proposed formal opinion providing more detailed guidance on an attorney’s ethical obligations in complex litigation involving e-discovery. The opinion identified specific tasks that an attorney should be able to competently perform and remedial options if the attorney lacks the required level of expertise. (Cal. State Bar, Proposed Formal Op. Interim No. 11-0004.)
None of this guidance claims to impose new duties or obligations on attorneys, but these changes reflect a growing effort to underscore that technological proficiency is no longer an issue for only specialty counsel. “I do not think attorneys or judges have to be tech wizards,” says Judge Rosenthal, “but it is important to have a general awareness of the need to ensure that this aspect of a case is dealt with and that people who do have the necessary expertise are brought in to confront the problems.”
The rapid pace at which technology changes and improves poses particular challenges for litigators in competently handling both new data sources and process-dedicated tools. To stay up to speed, Judge Rosenthal encourages counsel to review the many examples of detailed guidance and emerging best practices from different sources, such as the ABA, The Sedona Conference and the US Court of Appeals for the Seventh Circuit through its Electronic Discovery Pilot Program. “We all need to keep learning this stuff,” she says plainly, “because it keeps changing.”
For more on recent guidance and current best practices to comply with counsel’s obligation to be technologically competent, see Article, Litigation, Technology & Ethics: Changing Expectations.

Changing Law School Curriculum

Recognizing the increasingly prominent role of e-discovery in litigation, law schools are starting to incorporate e-discovery related coursework into their curriculum. For example, Columbia Law School, Georgetown University Law Center and American University Law School now offer courses and clinical programs in e-discovery, typically taught by adjunct faculty from private practice. Earlier this year, Cardozo Law School launched the Cardozo Data Law Initiative, a comprehensive certificate-based program intended to prepare students for careers in e-discovery, information governance, data privacy and cybersecurity by combining coursework in these subjects with clinical externship experience in the technology industry.
All of these programs take a functional and practical approach to e-discovery education, focusing on legal and technological guidance from case law and leading organizations like The Sedona Conference. They often feature a range of guest speakers from different parts of the industry and have students conduct mock custodial interviews or negotiations with opposing counsel.
The benefits of these programs are significant. “There will be graduating law students with actual hands-on experience in how to tackle these issues,” says Tadler. “These students also have direct access to professionals in the industry and can hear firsthand how this area of the law is developing and why.”
Taking advantage of these opportunities not only prepares new attorneys to better assist their clients and supervisors in practice, but also better positions them to succeed in business development. Baron advises that “the way to get ahead in the practice of law, especially when building a practice in a difficult economy, is to build your own skill set and expertise in some manner of technology.”